Aron Mesterbasic
The goal of this 3-day accelerated course is to provide anyone who works in a regulatory, investigative, fact finding, enforcement or prosecution role within an organisation, a fully immersed, zero-distraction, practical training experience.
Your course package is designed to provide maximum learning and convenience. This is included in the price of your course:
Your expert instructor will get you ready for the following exam and certification, which are not included in your course package and covered by the Certification guarantee.
We recommend students taking this course to have the following prerequisites:
- Familiarity with the Microsoft Windows operating system from a basic user’s perspective
- Understanding of how to create and manage folders and files
- Familiarity of Google and / or other major search engines
- Investigative or enquiring mindset
- An interest in social media platforms. A Facebook account is recommended but not essential.
Using our engaging learning methodology including a variety of tools, we’ll cover the entire curriculum.
Module Opening
- Health and Safety
- Module Outline
- Learning Outcomes and Timetable
- Introductions
- Course resources & websites
-URL versus Search bar
- Online quiz, knowledge check
Communication Profiles
- What is a communication Profile?
- Why do we need Communication Profiles?
- What should be included in a Communication Profile
- Keeping a Communications Profile current
- Source of Information for a Communications Profile
Planning an Online Investigation and Investigation Styles
- Professional Methodology
- Covert and Overt investigations
- Proactive and Reactive investigations
- The briefing process, investigation parameters and expectations
- Authorisations, policies and procedures
- Equipment considerations
- Record Keeping
Internet Architecture
- What is a network?
- What is the Internet?
- Internet Protocols
- Routers and Switches
- Domain Names & Domain Name Service
- Unique Resource Locators (URL)
- Shortened and Obfuscated URL’s
- Using the command line
Anonymisation
- Why anonymise?
- Virtual Private Networks
- Browser based tools
- Other anonymisation techniques
- False Personas
- Virtual Machines
Crypto Currency
- What is crypto currency?
- How does it work?
- Wallets & Ledgers
- Seizure as an asset
Evidence Capture
- Why capture?
- What should we capture?
- Capture tools and software?
- Dealing with captured digital material
Advanced Searching Techniques
- Google and other major search engines
- Search tools and specialist search engines
- Filters and managing search results
- Historic searching
Investigating Digital Images
- What is Meta and EXIF data?
- Examination tools and techniques
- Extraction websites
- Removing Meta and EXIF data
- Introduction to Geolocation
- Mapping
Investigating Websites and Internet Traces
- Resolving domain names
- Regional Internet Registries
- Historic and cached websites
- Hidden links
- Offline viewing tools
- HTML and other source code
- Website update alerts
Investigating Email and Email Traces
- Capturing email headers
- Manual examination of email headers
- Automated examination of email headers
- Information contained in email headers
Emerging Technologies
- Internet of things
- Mobile devices and internet access
- BLE beacons
- Cyber enabled and cyber dependant crimes
Legislation and Procedures
- Legislation effecting internet investigation
- Stated cases influencing online investigative tactics
- Directed surveillance online
- National law enforcement guidance
- Local procedure and policy
Investigating the Deep Web and TOR
- What is the Deep Web?
- What is TOR?
- How does TOR work?
- Installing TOR
- Risks of using the deep web in investigations
- TOR Search tools and techniques
Internet Relay Chat, Newsgroups, Forums
- What is Internet Relay Chat (IRC)?
- Configuring the IRC client
- Evidence gathering on IRC
- Gathering evidence from newsgroups
- Interrogating internet forums
Social Networks and Online False Personas
- What is a Social Network?
- Usernames, associations and other traces
- Social network advanced search tools and services
- Exploiting geo-located social network posts
- Risks associated with social networks
Online Marketplaces
- Types of Online Marketplaces
- Searching techniques applicable to online marketplaces
- Evidential opportunities presented by online market places
- Payment methods and techniques
- Final Exercise
Final Exercise Debrief
Module Closure
- Review of learning outcomes
Das virtuelle Klassenzimmer ist ein Online-Raum, in dem Sie mit Ihrem Dozenten und Ihren Mitschülern in Echtzeit zusammenarbeiten. Alles geschieht live, und Sie können frei interagieren, diskutieren, Fragen stellen und Ihrem Dozenten dabei zusehen, wie er auf einem Whiteboard präsentiert, die Kursunterlagen und Folien bespricht, mit Übungen arbeitet und diese überprüft.
Ja, Sie können Prüfungen von allen großen Anbietern wie Microsoft, Cisco usw. bequem von zu Hause oder vom Büro aus ablegen.
Mit Readynez können Sie jeden Kurs bequem von zu Hause oder vom Büro aus absolvieren. Readynez bietet Unterstützung und bewährte Verfahren für Ihr Klassenzimmer zu Hause und Sie können das Lernen mit minimalen Auswirkungen auf Ihr tägliches Leben genießen. Außerdem sparen Sie sich die Kosten und die Umweltbelastung durch Reisen.
Tja, Lernen ist grenzenlos, wenn man motiviert ist, aber man braucht den richtigen Weg, um zu erreichen, was man will. Readynez Berater haben viele Jahre Erfahrung in der Gestaltung von Lernpfaden, und wir können auch einen für Sie entwerfen. Wir stehen Ihnen jederzeit mit Rat und Tat zur Seite. Sie können uns im Chat erreichen oder schreiben Sie uns an info@readynez.com.